Follow
Robert Abercrombie
Robert Abercrombie
Prime Time Computing, LLC
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6 (4), 269-281, 2010
672010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
672007
A study of scientometric methods to identify emerging technologies via modeling of milestones
RK Abercrombie, AW Udoeyop, BG Schlicher
Scientometrics 91 (2), 327-342, 2012
402012
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
392009
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Information Systems and e-Business Management 10 (4), 433-453, 2012
372012
Method and system for determining a volume of an object from two-dimensional images
RK Abercrombie, BG Schlicher
US Patent 7,773,773, 2010
342010
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5, 2015
312015
System and method for identifying, validating, weighing and characterizing moving or stationary vehicles and cargo
DL Beshears, SG Batsell, RK Abercrombie, MB Scudiere, CP White
US Patent 7,305,324, 2007
312007
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
302014
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
302013
Evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
292008
Managing complex IT security processes with value based measures
RK Abercrombie, FT Sheldon, A Mili
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 69-75, 2009
232009
Security management of cyber physical control systems using NIST SP 800-82r2
AA Jillepalli, FT Sheldon, DC de Leon, M Haney, RK Abercrombie
2017 13th International Wireless Communications and Mobile Computing …, 2017
202017
OPNET/simulink based testbed for disturbance detection in the smart grid
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
192015
Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value
RK Abercrombie, FT Sheldon, A Mili
2008 11th IEEE High Assurance Systems Engineering Symposium, 479-482, 2008
192008
Towards reducing the data exfiltration surface for the insider threat
BG Schlicher, LP MacIntyre, RK Abercrombie
2016 49th Hawaii International Conference on System Sciences (HICSS), 2749-2758, 2016
142016
Co-simulation platform for characterizing cyber attacks in cyber physical systems
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie, S Kher
2015 IEEE Symposium Series on Computational Intelligence, 1244-1251, 2015
142015
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance-Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis …
RK Abercrombie, FT Sheldon, MR Grimaila
2010 IEEE Second International Conference on Social Computing, 1153-1158, 2010
142010
System and method for implementing and monitoring a cyberspace security econometrics system and other complex systems
RK Abercrombie, FT Sheldon, A Mili
US Patent App. 12/421,933, 2009
142009
Quantifying security threats and their impact.
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
CSIIRW, 26, 2009
142009
The system can't perform the operation now. Try again later.
Articles 1–20